{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T22:34:31.199","vulnerabilities":[{"cve":{"id":"CVE-2024-28234","sourceIdentifier":"security-advisories@github.com","published":"2024-04-09T14:15:08.897","lastModified":"2025-01-02T17:49:55.720","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Contao is an open source content management system. Starting in version 2.0.0 and prior to versions 4.13.40 and 5.3.4, it is possible to inject CSS styles via BBCode in comments. Installations are only affected if BBCode is enabled. Contao versions 4.13.40 and 5.3.4 have a patch for this issue. As a workaround, disable BBCode for comments."},{"lang":"es","value":"Contao es un sistema de gestión de contenidos de código abierto. A partir de la versión 2.0.0 y anteriores a las versiones 4.13.40 y 5.3.4, es posible inyectar estilos CSS a través de BBCode en los comentarios. Las instalaciones sólo se ven afectadas si BBCode está habilitado. Las versiones 4.13.40 y 5.3.4 de Contao tienen un parche para este problema. Como workaround, desactive BBCode para comentarios."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"4.13.40","matchCriteriaId":"A6D7972F-AE24-4CA4-8BB6-BCA79D6A2BAB"},{"vulnerable":true,"criteria":"cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.3.4","matchCriteriaId":"556D1F95-B80C-4819-BFC2-CF3EF735BBE6"}]}]}],"references":[{"url":"https://contao.org/en/security-advisories/insufficient-bbcode-sanitization","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://contao.org/en/security-advisories/insufficient-bbcode-sanitization","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}